Abstract

This paper analyzes the dangers to which web content is exposed, demonstrates how data from the Internet can be gathered and used to obtain profit, how an application can stealthily make use of complicated processing without implementing them and how a website can be cloned in real time. For the considered attacks and vulnerabilities I present, explain, group and evaluate the existing solutions to secure content and last but not least, I suggest a new solution: a library for link encryption.

References

No relevant information is available
If you register references through the customer center, the reference information will be registered as soon as possible.